pentestransomwarebugsecuritypolicyDDoScyberattackencryptionsecurityawarenessexploitAPTDarkWebspywarewormhackeradminCIAtriadpasswordIPSsocialengineeringvishingbreachSyssecAdminEDRDefense-in-depthCyberSecurityProofpointcompliancePHIFTPresiliencepacketIOCfirewallincidentrootkitriskassessmentOSantivirusVPNsmishingIPtrainingspamidentitytheftmalwareBECconfidentialityinsiderthreatintegrityCyberDefensevirusincidentresponseMFAbotnetvulnerabilityPIIavailabilityIDSspoofingWISPpassphrasezero-daydefenseevasionbusinesscontinuityHIPAAescalationphishingIoTSecurityOperationscryptographynetworkriskpentestransomwarebugsecuritypolicyDDoScyberattackencryptionsecurityawarenessexploitAPTDarkWebspywarewormhackeradminCIAtriadpasswordIPSsocialengineeringvishingbreachSyssecAdminEDRDefense-in-depthCyberSecurityProofpointcompliancePHIFTPresiliencepacketIOCfirewallincidentrootkitriskassessmentOSantivirusVPNsmishingIPtrainingspamidentitytheftmalwareBECconfidentialityinsiderthreatintegrityCyberDefensevirusincidentresponseMFAbotnetvulnerabilityPIIavailabilityIDSspoofingWISPpassphrasezero-daydefenseevasionbusinesscontinuityHIPAAescalationphishingIoTSecurityOperationscryptographynetworkrisk

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. pentest
  2. ransomware
  3. bug
  4. security policy
  5. DDoS
  6. cyber attack
  7. encryption
  8. security awareness
  9. exploit
  10. APT
  11. Dark Web
  12. spyware
  13. worm
  14. hacker
  15. admin
  16. CIA triad
  17. password
  18. IPS
  19. social engineering
  20. vishing
  21. breach
  22. SyssecAdmin
  23. EDR
  24. Defense-in-depth
  25. Cyber Security
  26. Proofpoint
  27. compliance
  28. PHI
  29. FTP
  30. resilience
  31. packet
  32. IOC
  33. firewall
  34. incident
  35. rootkit
  36. risk assessment
  37. OS
  38. antivirus
  39. VPN
  40. smishing
  41. IP
  42. training
  43. spam
  44. identity theft
  45. malware
  46. BEC
  47. confidentiality
  48. insider threat
  49. integrity
  50. Cyber Defense
  51. virus
  52. incident response
  53. MFA
  54. botnet
  55. vulnerability
  56. PII
  57. availability
  58. IDS
  59. spoofing
  60. WISP
  61. passphrase
  62. zero-day
  63. defense evasion
  64. business continuity
  65. HIPAA
  66. escalation
  67. phishing
  68. IoT
  69. Security Operations
  70. cryptography
  71. network
  72. risk